Skip to content

Leftover questions about age #367

Answered by covert-encryption
UnixCro asked this question in Q&A
Discussion options

You must be logged in to vote

@UnixCro There are so insanely many possible secret keys that it is impossible to ever create the same ones again, assuming that the source of random numbers is working properly. It is impossible to grasp how large the number of possibilities is, but here is a video that covers it quite well: https://www.youtube.com/watch?v=S9JGmA5_unY

The encryption algorithm is ChaCha20 with Poly1305 authentication. This is mentioned in the specification, and is pretty much the best algorithm currently known, and also very widely used in different systems. Different types of recipient keys are used, as explained in the specs, to derive the file encryption key used with ChaCha20 which encrypts all your d…

Replies: 3 comments 1 reply

Comment options

You must be logged in to vote
0 replies
Answer selected by FiloSottile
Comment options

You must be logged in to vote
0 replies
Comment options

You must be logged in to vote
1 reply
@FiloSottile
Comment options

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
4 participants
Converted from issue

This discussion was converted from issue #363 on November 29, 2021 12:59.